Follow
Yuan Hong
Title
Cited by
Cited by
Year
Differentially private naive bayes classification
J Vaidya, B Shafiq, A Basu, Y Hong
2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI …, 2013
1392013
Collaborative search log sanitization: Toward differential privacy and boosted utility
Y Hong, J Vaidya, H Lu, P Karras, S Goel
IEEE Transactions on Dependable and Secure Computing 12 (5), 504-518, 2015
942015
Secure transformation for multiparty linear programming
Y Hong, J Vaidya
89*2013
Security challenges in smart grid implementation
S Goel, Y Hong, V Papakonstantinou, D Kloza
Smart grid security, 1-39, 2015
872015
Releasing correlated trajectories: Towards high utility and optimal differential privacy
L Ou, Z Qin, S Liao, Y Hong, X Jia
IEEE Transactions on Dependable and Secure Computing 17 (5), 1109-1123, 2020
762020
On the robust and stable flowshop scheduling under stochastic and dynamic disruptions
F Liu, S Wang, Y Hong, X Yue
IEEE Transactions on Engineering Management 64 (4), 539-553, 2017
752017
Constraint-aware role mining via extended boolean matrix decomposition
H Lu, J Vaidya, V Atluri, Y Hong
IEEE Transactions on Dependable and Secure Computing 9 (5), 655-669, 2012
722012
Dynamic pricing for electric vehicle extreme fast charging
C Fang, H Lu, Y Hong, S Liu, J Chang
IEEE Transactions on Intelligent Transportation Systems 22 (1), 531-541, 2021
672021
Privacy Preserving Smart Meter Streaming against Information Leakage of Appliance Status
Y Hong, WM Liu, L Wang
IEEE Transactions on Information Forensics and Security 12 (9), 2227-2241, 2017
652017
Effective anonymization of query logs
Y Hong, X He, J Vaidya, N Adam, V Atluri
Proceedings of the 18th ACM conference on Information and knowledge …, 2009
632009
Smart grid security
S Goel, Y Hong, V Papakonstantinou, D Kloza
Springer, 2015
492015
An efficient and privacy‐preserving scheme for P2P energy exchange among smart microgrids
Y Hong, S Goel, WM Liu
International Journal of Energy Research 40 (3), 313–331, 2016
472016
Secure and efficient distributed linear programming
Y Hong, J Vaidya, H Lu
Journal of Computer Security 20 (5), 583-634, 2012
472012
Wider face and pedestrian challenge 2018: Methods and results
CC Loy, D Lin, W Ouyang, Y Xiong, S Yang, Q Huang, D Zhou, W Xia, ...
arXiv preprint arXiv:1902.06854, 2019
452019
Differentially private search log sanitization with optimal output utility
Y Hong, J Vaidya, H Lu, M Wu
Proceedings of the 15th International Conference on Extending Database …, 2012
432012
Preserving both privacy and utility in network trace anonymization
M Mohammady, L Wang, Y Hong, H Louafi, M Pourzandi, M Debbabi
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
412018
Towards user-oriented RBAC model
H Lu, Y Hong, Y Yang, L Duan, N Badar
Journal of Computer Security 23 (1), 107-129, 2015
372015
A Survey of Privacy-aware Supply Chain Collaboration: From Theory to Applications
Y Hong, J Vaidya, S Wang
Journal of Information Systems 28 (1), 243-268, 2014
352014
Videodp: A flexible platform for video analytics with differential privacy
H Wang, S Xie, Y Hong
Proceedings on Privacy Enhancing Technologies, 2020
34*2020
Integrated post-disaster medical assistance team scheduling and relief supply distribution
S Wang, F Liu, L Lian, Y Hong, H Chen
The International Journal of Logistics Management 29 (4), 1279-1305, 2018
342018
The system can't perform the operation now. Try again later.
Articles 1–20